Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Quorum Searchable Encryption Method

An encryption method and indexing technology, which is applied in the fields of secure data storage and information search, can solve the problems of not considering data encryption, not considering outsourcing decryption, and aggravating the computing tasks of data owners.

Active Publication Date: 2020-05-26
CHONGQING UNIV OF POSTS & TELECOMM
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Chinese patent CN103179114A proposes a method for fine-grained data access control in cloud storage, which realizes the revoking of user permissions, but does not consider outsourcing decryption; based on the attribute encryption mechanism, patents CN105592100A and CN104901942A provide effective privacy protection for big data methods, and all take into account outsourcing decryption and user revocation, but cannot implement search functions on encrypted data, and cannot achieve efficient user utilization
However, users need to use different encryption methods for data plaintext and keywords, which increases the calculation tasks of data owners; CN105897419A proposes a multi-user dynamic keyword searchable encryption method, but does not consider user revocation and data encryption; CN104780161A A multi-user based searchable encryption method in cloud storage is proposed, but without fine-grained control over users, and without consideration of data encryption
In addition, the author Wenhai Sun et al. proposed a searchable encryption mechanism based on attribute passwords in the document "Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud", which supports user attribute revocation, but needs to be updated All legitimate user private keys and ciphertexts make the system less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quorum Searchable Encryption Method
  • A Quorum Searchable Encryption Method
  • A Quorum Searchable Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] Hereinafter, the preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0110] The online and offline searchable encryption mechanism based on arbitration attributes provided by the present invention includes the following steps, see figure 1 :

[0111] S1: System initialization, generating system public parameters (including public / private key pairs for each attribute) and Mediator public / private key pairs, see figure 2 ;

[0112] Further, the step S1 includes the following steps:

[0113] S11: System initialization, input security parameter λ, generate system public parameters, system master key, where system public parameters include two bilinear groups G and G of order p T , The generator g in G and the bilinear mapping e: G×G→G T , Hash function H: {0,1} * →Z p , And the public / private key pair of each attribute, let i denote the attribute, and choose a random number t 1 ,...,t 3n ∈ Z p , Calculate Where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mediated and searchable encryption method. The method comprises the following steps: S1, system initialization; S2, keyword encryption; S3, data encryption; S4, user key generation; S5, search Trapdoor generation; S6, data searching; S7, data decryption; and S8, user revocation. The mediated and searchable encryption method provided by the invention has the advantages that online and offline encryption and mediated encryption can be achieved, the method is applicable to a mobile cloud computing environment, and user permissions can be revoked instantly.

Description

Technical field [0001] The invention belongs to the field of data security storage and information search, and relates to an arbitration searchable encryption method. Background technique [0002] With the rapid development and wide application of technologies such as big data, cloud computing, and the Internet of Things, massive amounts of data generated by a large number of users will be uploaded to the cloud server for storage or calculation to solve local servers or personal computers and mobile terminals The computing and storage resources of other equipment are insufficient. Among them, the Internet of Things technology enables more smart terminals to join the Internet, and with more data transmitted to the cloud. However, when user data is uploaded to a third-party server, the user loses direct control over the data. Most of the existing third-party servers are operated by commercial companies, so data security and privacy face great challenges, such as personal Electron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/0861H04L9/088H04L63/10H04L63/101
Inventor 周静肖敏蒋明达
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products